Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Machine learning

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 301 - 330 of 1686

Full-Text Articles in Physical Sciences and Mathematics

A Quantum Approach To Language Modeling, Constantijn Van Der Poel Feb 2023

A Quantum Approach To Language Modeling, Constantijn Van Der Poel

Dissertations, Theses, and Capstone Projects

This dissertation consists of six chapters. . . Chapter 1: We introduce language modeling, outline the software used for this thesis, and discuss related work. Chapter 2: We will unpack the transition from classical to quantum probabilities, as well as motivate their use in building a model to understand language-like datasets. Chapter 3: We motivate the Motzkin dataset, the models we will be investigating, as well as the necessary algorithms to do calculations with them. Chapter 4: We investigate our models’ sensitivity to various hyperparameters. Chapter 5: We compare the performance and robustness of the models. Chapter 6: We conclude …


Prediction Of Wilms’ Tumor Susceptibility To Preoperative Chemotherapy Using A Novel Computer-Aided Prediction System, Israa Sharaby, Ahmed Alksas, Ahmed Nashat, Hossam Magdy Balaha, Mohamed Shehata, Mallorie Gayhart, Ali Mahmoud, Mohammed Ghazal, Ashraf Khalil, Rasha T. Abouelkheir, Ahmed Elmahdy, Ahmed Abdelhalim, Ahmed Mosbah, Ayman El-Baz Feb 2023

Prediction Of Wilms’ Tumor Susceptibility To Preoperative Chemotherapy Using A Novel Computer-Aided Prediction System, Israa Sharaby, Ahmed Alksas, Ahmed Nashat, Hossam Magdy Balaha, Mohamed Shehata, Mallorie Gayhart, Ali Mahmoud, Mohammed Ghazal, Ashraf Khalil, Rasha T. Abouelkheir, Ahmed Elmahdy, Ahmed Abdelhalim, Ahmed Mosbah, Ayman El-Baz

All Works

Wilms’ tumor, the most prevalent renal tumor in children, is known for its aggressive prognosis and recurrence. Treatment of Wilms’ tumor is multimodal, including surgery, chemotherapy, and occasionally, radiation therapy. Preoperative chemotherapy is used routinely in European studies and in select indications in North American trials. The objective of this study was to build a novel computer-aided prediction system for preoperative chemotherapy response in Wilms’ tumors. A total of 63 patients (age range: 6 months–14 years) were included in this study, after receiving their guardians’ informed consent. We incorporated contrast-enhanced computed tomography imaging to extract the texture, shape, and functionality-based …


Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq Feb 2023

Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq

All Works

Field-Programmable Gate Array (FPGA) is at the core of System on Chip (SoC) design across various Industry 5.0 digital systems—healthcare devices, farming equipment, autonomous vehicles and aerospace gear to name a few. Given that pre-silicon verification using Computer Aided Design (CAD) accounts for about 70% of the time and money spent on the design of modern digital systems, this paper summarizes the machine learning (ML)-oriented efforts in different FPGA CAD design steps. With the recent breakthrough of machine learning, FPGA CAD tasks—high-level synthesis (HLS), logic synthesis, placement and routing—are seeing a renewed interest in their respective decision-making steps. We focus …


Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese Feb 2023

Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese

All Faculty Scholarship

Machine learning, or artificial intelligence, refers to a vast array of different algorithms that are being put to highly varied uses, including in transportation, medicine, social media, marketing, and many other settings. Not only do machine-learning algorithms vary widely across their types and uses, but they are evolving constantly. Even the same algorithm can perform quite differently over time as it is fed new data. Due to the staggering heterogeneity of these algorithms, multiple regulatory agencies will be needed to regulate the use of machine learning, each within their own discrete area of specialization. Even these specialized expert agencies, though, …


Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski Jan 2023

Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

Suicidal and self-injurious incidents in correctional settings deplete the institutional and healthcare resources, create disorder and stress for staff and other inmates. Traditional statistical analyses provide some guidance, but they can only be applied to structured data that are often difficult to collect and their recommendations are often expensive to act upon. This study aims to extract information from medical and mental health progress notes using AI algorithms to make actionable predictions of suicidal and self-injurious events to improve the efficiency of triage for health care services and prevent suicidal and injurious events from happening at California's Orange County Jails. …


A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas Jan 2023

A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas

National Training Aircraft Symposium (NTAS)

Flight delays can be prevented by providing a reference point from an accurate prediction model because predicting flight delays is a problem with a specific space. Only a few algorithms consider predicted classes' mutual correlation during flight delay classification or prediction modelling tasks. None of these existing methods works for all scenarios. Therefore, the need to investigate the performance of more models in solving the problem of flight delay is vast and rapidly increasing. This paper presents the development and evaluation of LSTM and BiLSTM models by comparing them for a flight delay prediction. The LSTM does the feature extraction …


Visual Analytics And Modeling Of Materials Property Data, Diwas Bhattarai Jan 2023

Visual Analytics And Modeling Of Materials Property Data, Diwas Bhattarai

LSU Doctoral Dissertations

Due to significant advancements in experimental and computational techniques, materials data are abundant. To facilitate data-driven research, it calls for a system for managing and sharing data and supporting a set of tools for effective data analysis and modeling. Generally, a given material property M can be considered as a multivariate data problem. The dimensions of M are the values of the property itself, the conditions (pressure P, temperature T, and multi-component composition X) that control the concerned property, and relevant metadata I (source, date).

Here we present a comprehensive database considering both experimental and computational sources …


Machine Learning Models Interpretability For Malware Detection Using Model Agnostic Language For Exploration And Explanation, Ikuromor Mabel Ogiriki Jan 2023

Machine Learning Models Interpretability For Malware Detection Using Model Agnostic Language For Exploration And Explanation, Ikuromor Mabel Ogiriki

Theses and Dissertations

The adoption of the internet as a global platform has birthed a significant rise in cyber-attacks of various forms ranging from Trojans, worms, spyware, ransomware, botnet malware, rootkit, etc. In order to tackle the issue of all these forms of malware, there is a need to understand and detect them. There are various methods of detecting malware which include signature, behavioral, and machine learning. Machine learning methods have proven to be the most efficient of all for malware detection. In this thesis, a system that utilizes both the signature and dynamic behavior-based detection techniques, with the added layer of the …


Data Augmentation For Neutron Spectrum Unfolding With Neural Networks, James Mcgreivy, Juan J. Manfredi, Daniel Siefman Jan 2023

Data Augmentation For Neutron Spectrum Unfolding With Neural Networks, James Mcgreivy, Juan J. Manfredi, Daniel Siefman

Faculty Publications

Neural networks require a large quantity of training spectra and detector responses in order to learn to solve the inverse problem of neutron spectrum unfolding. In addition, due to the under-determined nature of unfolding, non-physical spectra which would not be encountered in usage should not be included in the training set. While physically realistic training spectra are commonly determined experimentally or generated through Monte Carlo simulation, this can become prohibitively expensive when considering the quantity of spectra needed to effectively train an unfolding network. In this paper, we present three algorithms for the generation of large quantities of realistic and …


Soil Moisture And Geomorphologic Data For Use In Dynamic And Forecastable Landslide Hazard Analyses In Eastern Kentucky, Daniel M. Francis, L. Sebastian Bryson Jan 2023

Soil Moisture And Geomorphologic Data For Use In Dynamic And Forecastable Landslide Hazard Analyses In Eastern Kentucky, Daniel M. Francis, L. Sebastian Bryson

Civil Engineering Research Data

These data are the geomorphologic and land information system-based soil moisture estimates from assimilation of NASA SMAP satellite-based observations and NOAH 3.6 Land Surface Model estimates over known landslides in Eastern Kentucky. Additionally Long Short-Term Memory Recurrent Neural Network and logistic regression machine learning codes, as well as an Application programming interface code are included. Finally, in-situ data from Eastern Kentucky is included.


Convolution Neural Networks For Phishing Detection, Arun D. Kulkarni Jan 2023

Convolution Neural Networks For Phishing Detection, Arun D. Kulkarni

Computer Science Faculty Publications and Presentations

Phishing is one of the significant threats in cyber security. Phishing is a form of social engineering that uses e-mails with malicious websites to solicitate personal information. Phishing e-mails are growing in alarming number. In this paper we propose a novel machine learning approach to classify phishing websites using Convolution Neural Networks (CNNs) that use URL based features. CNNs consist of a stack of convolution, pooling layers, and a fully connected layer. CNNs accept images as input and perform feature extraction and classification. Many CNN models are available today. To avoid vanishing gradient problem, recent CNNs use entropy loss function …


Multispectral Image Analysis Using Convolution Neural Networks, Arun D. Kulkarni Jan 2023

Multispectral Image Analysis Using Convolution Neural Networks, Arun D. Kulkarni

Computer Science Faculty Publications and Presentations

Machine learning (ML) techniques are used often to classify pixels in multispectral images. Recently, there is growing interest in using Convolution Neural Networks (CNNs) for classifying multispectral images. CNNs are preferred because of high performance, advances in hardware such as graphical processing units (GPUs), and availability of several CNN architectures. In CNN, units in the first hidden layer view only a small image window and learn low level features. Deeper layers learn more expressive features by combining low level features. In this paper, we propose a novel approach to classify pixels in a multispectral image using deep convolution neural networks …


A Machine Learning Approach To Deepfake Detection, Delaney Conrad Jan 2023

A Machine Learning Approach To Deepfake Detection, Delaney Conrad

All Undergraduate Theses and Capstone Projects

The ability to manipulate videos has been around for decades but a process that once would take time, money, and professionals, can now be created by anyone due to the rapid advancement of deepfake technology. Deepfakes use deep learning artificial intelligence to make fake digital content, typically in the form of swapping a person’s face in a video or image. This technology could easily threaten and manipulate individuals, corporations, and political organizations, so it is essential to find methods for detecting deepfakes. As the technology for creating deepfakes continues to improve, these manipulated videos are becoming increasingly undetectable. It is …


An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis Jan 2023

An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.

In this work, we present the first empirical investigation of PTM reuse. …


Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty Jan 2023

Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty

VMASC Publications

Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …


Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty Jan 2023

Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty

VMASC Publications

Background: Developing effective and generalizable predictive models is critical for disease prediction and clinical decision-making, often requiring diverse samples to mitigate population bias and address algorithmic fairness. However, a major challenge is to retrieve learning models across multiple institutions without bringing in local biases and inequity, while preserving individual patients' privacy at each site.

Objective: This study aims to understand the issues of bias and fairness in the machine learning process used in the predictive health care domain. We proposed a software architecture that integrates federated learning and blockchain to improve fairness, while maintaining acceptable prediction accuracy and minimizing overhead …


Silicon And Oxygen In Earth’S Core: Applications Of Machine Learning To Metal-Silicate Equilibria And Core Formation, Ruben Keane Jan 2023

Silicon And Oxygen In Earth’S Core: Applications Of Machine Learning To Metal-Silicate Equilibria And Core Formation, Ruben Keane

WWU Honors College Senior Projects

Within Earth’s core, light elements (Si, O, C, S, N, H) are known to make up a small fraction of the total mass of the core with respect to heavy elements. The degree to which these elements exist in the cores of terrestrial planets have geophysical and geochemical implications, most notably the presence of core convection and a geodynamo, thermal conductivity within the core, and core temperature. Comparison of the composition of chondrites to Earth’s mantle composition and the Preliminary Reference Earth Model have given an estimation of about 10 % light elements in Earth’s core. The concentrations of each …


Applications Of Digital Terrain Modeling To Address Problems In Geomorphology And Engineering Geology, Sarah Johnson Jan 2023

Applications Of Digital Terrain Modeling To Address Problems In Geomorphology And Engineering Geology, Sarah Johnson

Theses and Dissertations--Earth and Environmental Sciences

This dissertation uses digital terrain modeling and computational methods to yield insight into three topics: 1) evaluating the influence of glacial topography on fluvial sediment transport in the Teton Range, WY, 2) integrating regional airborne lidar, UAV lidar, and structure from motion photogrammetry to characterize decadal-scale movement of slow-moving landslides in northern Kentucky, and 3) applying machine learning methods to surficial geologic mapping.

The role of topography as a boundary condition that controls the efficiency of fluvial erosion in the Teton Range, Wyoming, was investigated by using existing lidar data to delineate surficial geologic units, geometrically reconstruct the depth to …


Using Machine Learning To Search For Vector Boson Scattering At The Cms Detector During Run 2, Mark Mekosh Jan 2023

Using Machine Learning To Search For Vector Boson Scattering At The Cms Detector During Run 2, Mark Mekosh

Graduate Research Theses & Dissertations

This work reports on the use of different machine learning (ML) techniques in the search for vector boson scattering (VBS) events in the semileptonic $WV$ channel. VBS is an important process for studying electroweak symmetry breaking (EWSB), the Higgs mechanism, as well as for probing beyond the standard model physics. Boosted decision trees as well as deep neural networks were trained on Monte Carlo simulation samples and applied to 137 fb$^{-1}$ of proton-proton collision data taken from 2016 to 2018 by the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC) with a center of mass energy $\sqrt{s} …


Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung Jan 2023

Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung

Electrical and Computer Engineering Faculty Publications

The use of network connected devices has grown exponentially in recent years revolutionizing our daily lives. However, it has also attracted the attention of cybercriminals making the attacks targeted towards these devices increase not only in numbers but also in sophistication. To detect such attacks, a Network Intrusion Detection System (NIDS) has become a vital component in network applications. However, network devices produce large scale high-dimensional data which makes it difficult to accurately detect various known and unknown attacks. Moreover, the complex nature of network data makes the feature selection process of a NIDS a challenging task. In this study, …


Spatiotemporal Retrievals Of Soil Moisture And Geomorphologic Data For Landslide Sites In Eastern Kentucky, Lindsey Sebastian Bryson, Daniel M. Francis Jan 2023

Spatiotemporal Retrievals Of Soil Moisture And Geomorphologic Data For Landslide Sites In Eastern Kentucky, Lindsey Sebastian Bryson, Daniel M. Francis

Civil Engineering Research Data

These data are the soil texture, land information system-based soil moisture estimates from assimilation of NASA SMAP satellite-based observations and NOAH 3.6 Land Surface Model estimates, artificial neural network machine learning code, and in-situ soil moisture measurements.


Determining Child Sexual Abuse Posts Based On Artificial Intelligence, Susan Mckeever, Christina Thorpe, Vuong Ngo Jan 2023

Determining Child Sexual Abuse Posts Based On Artificial Intelligence, Susan Mckeever, Christina Thorpe, Vuong Ngo

Conference papers

The volume of child sexual abuse materials (CSAM) created and shared daily both surface web platforms such as Twitter and dark web forums is very high. Based on volume, it is not viable for human experts to intercept or identify CSAM manually. However, automatically detecting and analysing child sexual abusive language in online text is challenging and time-intensive, mostly due to the variety of data formats and privacy constraints of hosting platforms. We propose a CSAM detection intelligence algorithm based on natural language processing and machine learning techniques. Our CSAM detection model is not only used to remove CSAM on …


Machine Learning Prediction Of Dod Personal Property Shipment Costs, Tiffany Tucker [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals Jan 2023

Machine Learning Prediction Of Dod Personal Property Shipment Costs, Tiffany Tucker [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals

Faculty Publications

U.S. Department of Defense (DoD) personal property moves account for 15% of all domestic and international moves - accurate prediction of their cost could draw attention to outlier shipments and improve budget planning. In this work 136,140 shipments between 13 personal property shipment hubs from April 2022 through March 2023 with a total cost of $1.6B were analyzed. Shipment cost was predicted using recursive feature elimination on linear regression and XGBoost algorithms, as well as through neural network hyperparameter sweeps. Modeling was repeated after removing 28 features related to shipment hub location and branch of service to examine their influence …


Time Series Forecasting For Stock Market Prices, Albert Zhou Jan 2023

Time Series Forecasting For Stock Market Prices, Albert Zhou

Senior Honors Projects

No abstract provided.


A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd Jan 2023

A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd

Journal of Aviation/Aerospace Education & Research

This paper proposes a classification approach for flight delays using Bidirectional Long Short-Term Memory (BiLSTM) and Long Short-Term Memory (LSTM) models. Flight delays are a major issue in the airline industry, causing inconvenience to passengers and financial losses to airlines. The BiLSTM and LSTM models, powerful deep learning techniques, have shown promising results in a classification task. In this study, we collected a dataset from the United States (US) Bureau of Transportation Statistics (BTS) of flight on-time performance information and used it to train and test the BiLSTM and LSTM models. We set three criteria for selecting highly important features …


Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun Jan 2023

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun

Electronic Theses and Dissertations

Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …


Online Sexual Predator Detection, Muhammad Khalid Jan 2023

Online Sexual Predator Detection, Muhammad Khalid

Electronic Theses and Dissertations

Online sexual abuse is a concerning yet severely overlooked vice of modern society. With more children being on the Internet and with the ever-increasing advent of web-applications such as online chatrooms and multiplayer games, preying on vulnerable users has become more accessible for predators. In recent years, there has been work on detecting online sexual predators using Machine Learning and deep learning techniques. Such work has trained on severely imbalanced datasets, and imbalance is handled via manual trimming of over-represented labels. In this work, we propose an approach that first tackles the problem of imbalance and then improves the effectiveness …


Detection And Diagnosis Of Bacterial Pathogens In Blood And Urine Using Laser-Induced Breakdown Spectroscopy, Emma J.M. Blanchette Jan 2023

Detection And Diagnosis Of Bacterial Pathogens In Blood And Urine Using Laser-Induced Breakdown Spectroscopy, Emma J.M. Blanchette

Electronic Theses and Dissertations

The aim of this thesis is to expand on and improve the existing techniques used for detecting and identifying bacterial pathogens in clinical specimens with laser-induced breakdown spectroscopy (LIBS). Specifically, the existing experimental procedures, including bacterial sample preparation and data acquisition, as well as the data analysis with chemometric algorithms were investigated. Substantial reductions in LIBS background signal were achieved by implementing rigorous cleaning steps and the introduction of the use of ultrapure water. Following this, a database of LIBS spectra was acquired from specimens of E. coli, S. aureus, E. cloacae, M. smegmatis, and P. …


Tree-Based Approaches For Predicting Financial Performance, Ahmed Shafeek Abouhassan Jan 2023

Tree-Based Approaches For Predicting Financial Performance, Ahmed Shafeek Abouhassan

Electronic Theses and Dissertations

The lending industry commonly relied on assessing borrowers’ repayment performance to make lending decisions. This is to safeguard their assets and maintain their profitability. With the rise of Artificial Intelligence, lenders resorted to Machine Learning (ML) algorithms to solve this problem.

In this study, the novelty introduced is applying ML’s Tree-based methods to a large dataset and accurately predicting financial repayment performance without using any repayment history, which was utilized in all literature reviewed. Instead, the attributes used were demographics and psychographics of applicants, only. The study’s proprietary US-based dataset comprises an anonymous population whose owner does not wish to …